From post

Modeling Network Traffic via Identifying Encrypted Packets to Detect Stepping-Stone Intrusion Under the Framework of Heterogonous Packet Encryption.

, , и . AINA (2), том 450 из Lecture Notes in Networks and Systems, стр. 516-527. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cluster Validity Through Graph-based Boundary Analysis., и . IKE, стр. 204-210. CSREA Press, (2004)Human Factor and Its Identification in Manufacturing Prediction., и . DIISM, том 168 из IFIP, стр. 367-374. Springer, (2002)Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection., и . ACNS, том 3989 из Lecture Notes in Computer Science, стр. 18-32. (2006)Self-Similar Characteristic of Traffic in Current Metro Area Network., , , , и . LANMAN, стр. 176-181. IEEE, (2007)Minimum-Latency Data Gathering Scheduling in Multi-Channel Wireless Sensor Networks Using Only Secure Links., , , и . MSN, стр. 170-175. IEEE, (2019)Effect of Static Bifurcation on Logical Stochastic Resonance in a Symmetric Bistable System., , , и . Int. J. Bifurc. Chaos, 31 (16): 2150246:1-2150246:16 (2021)Effects of Different Fast Periodic Excitations on the Pitchfork Bifurcation and Vibrational Resonance., , , , и . Int. J. Bifurc. Chaos, 30 (6): 2050092:1-2050092:14 (2020)A Framework to Test Resistency of Detection Algorithms for Stepping-Stone Intrusion on Time-Jittering Manipulation., , , и . Wirel. Commun. Mob. Comput., (2021)Effect of stimulation sites on the performance of electromagnetic middle ear implant: A finite element analysis., , , , , , и . Comput. Biol. Medicine, (2020)Mining TCP/IP packets to detect stepping-stone intrusion., и . Comput. Secur., 26 (7-8): 479-484 (2007)